mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
175 lines
5.6 KiB
JSON
175 lines
5.6 KiB
JSON
{
|
|
"id": "CVE-1999-0131",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "1996-09-11T04:00:00.000",
|
|
"lastModified": "2008-09-09T12:33:49.070",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eric_allman:sendmail:8.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9413566A-425B-4684-A332-A9DD3309FB51"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2D488B8-49D0-4AFD-A5C1-63CB036E3886"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3E2EE58-BCAD-4F26-94B6-F91CF1731429"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10AC2FAD-C4AD-46DD-88D1-4F99433B3476"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3B730F70-5662-4BE4-8202-93E12620CBD2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FA6D5E9F-275F-41EB-9707-6B7F129A700F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "766851E2-134A-4A89-931B-6F1753525684"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:digital:osf_1:1.3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44C3AF89-3854-4F37-807E-74FC0640693B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4054D69F-596F-4EB4-BE9A-E2478343F55A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53BBFE9A-6846-4625-91AC-47AA0BC0933A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:linux:3.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "445EECD3-2DB9-43D1-B26F-0979A3C02D45"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61FEF2E3-1939-42B3-B32F-A22C173A186A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0169CBF5-9301-42D2-A6DA-73393BD986D8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/717",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |